According to the incidence response plan, which of the following actions best contains any damage caused by a security threat?
A) preserve evidence of damage done
B) reevaluate risk matrix
C) restrict systems access
D) investigate system logs for evidence
Correct Answer:
Verified
Q66: Which of the following administrative security controls
Q67: The term _ refers to software that
Q68: Henley and Sons, a retail bank in
Q71: Which among the following authentication strategies is
Q72: A(n) _ is a self-replicating program that
Q73: Which among the following authentication strategies is
Q74: A(n) _ lists out and estimates the
Q76: _ refers to an attempt to steal
Q78: Which of the following technologies serves as
Q80: _ is one way of recovering systems
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents